Source: golang-github-gorilla-schema
Version: 1.2.0-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for golang-github-gorilla-schema.

CVE-2024-37298[0]:
| gorilla/schema converts structs to and from form values. Prior to
| version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has
| a field of type `[]struct{...}` opens it up to malicious attacks
| regarding memory allocations, taking advantage of the sparse slice
| functionality. Any use of `schema.Decoder.Decode()` on a struct with
| arrays of other structs could be vulnerable to this memory
| exhaustion vulnerability. Version 1.4.1 contains a patch for the
| issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-37298
    https://www.cve.org/CVERecord?id=CVE-2024-37298
[1] https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3
[2] 
https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff

Regards,
Salvatore

Reply via email to